What is spear phishing?

What is spear phishing?A . A physical attack where an unauthorized person gains entry to a restricted area by following closely behind an authorized person.B . A form of social engineering attack that uses SMS or text messages to trick victims into revealing sensitive information.C . A cyber attack where...

April 25, 2025 No Comments READ MORE +

What is the primary reason for implementing multi-factor authentication in a cloud environment?

What is the primary reason for implementing multi-factor authentication in a cloud environment?A . To provide an additional layer of securityB . To simplify the authentication processC . To reduce costsD . To improve performanceView AnswerAnswer: A Explanation: Option 1: Correct. Implementing multi-factor authentication provides an additional layer of security...

April 23, 2025 No Comments READ MORE +

What does hardening mean in the context of cybersecurity?

What does hardening mean in the context of cybersecurity?A . Removing all vulnerabilities from a system or networkB . Implementing cybersecurity policies and regulationsC . Creating a backup of critical data and configurationsD . Making a system more resistant to threats and attacksView AnswerAnswer: D Explanation: Hardening refers to the...

April 23, 2025 No Comments READ MORE +

Which of the following is an example of a private IP address?

Which of the following is an example of a private IP address?A . 169.254.0.1B . 203.0.113.0C . 172.16.0.0D . 198.51.100.0View AnswerAnswer: C Explanation: Among the given options, 172.16.0.0 is an example of a private IP address. It falls within the range of private IP addresses defined by RFC 1918, specifically...

April 22, 2025 No Comments READ MORE +

Which of the following is a data protection technique that involves the transformation of data into a format that is unreadable to unauthorized users?

Which of the following is a data protection technique that involves the transformation of data into a format that is unreadable to unauthorized users?A . AuthenticationB . EncryptionC . FirewallD . Intrusion Detection SystemView AnswerAnswer: B Explanation: Option 1: Incorrect. Authentication refers to the process of verifying the identity of...

April 21, 2025 No Comments READ MORE +

Which feature allows endpoints to communicate directly with each other, bypassing the network?

Which feature allows endpoints to communicate directly with each other, bypassing the network?A . FirewallB . IPSC . VPND . Peer-to-PeerView AnswerAnswer: D Explanation: Option 1: Incorrect. A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules. Option 2:...

April 18, 2025 No Comments READ MORE +

What is tailgating in the context of cybersecurity?

What is tailgating in the context of cybersecurity?A . A type of phishing attack that targets specific individuals or organizations.B . A physical attack where an unauthorized person gains entry to a restricted area by following closely behind an authorized person.C . A form of social engineering attack that uses...

April 18, 2025 No Comments READ MORE +

What is the primary characteristic of an Advanced Persistent Threat (APT) compared to traditional attacks?

What is the primary characteristic of an Advanced Persistent Threat (APT) compared to traditional attacks?A . APTs are easily detectable by conventional security measuresB . APTs involve persistent and prolonged attacks on specific targetsC . APTs are random and indiscriminate in their targetsD . APTs are primarily aimed at causing...

April 18, 2025 No Comments READ MORE +

Which of the following is a characteristic of cloud-based applications in the context of cybersecurity?

Which of the following is a characteristic of cloud-based applications in the context of cybersecurity?A . They provide enhanced flexibility and scalability for organizations.B . They are not widely used and are considered a less secure option.C . They require physical installation and maintenance, limiting their accessibility.D . They are...

April 17, 2025 No Comments READ MORE +

What is an insider threat?

What is an insider threat?A . A threat posed by an individual with authorized access to an organization's systems and data.B . A vulnerability in an organization's network infrastructure.C . The accidental disclosure of sensitive information.D . A security breach caused by an external attacker.View AnswerAnswer: A Explanation: Insider threats...

April 14, 2025 No Comments READ MORE +